| 
						
					 | 
					 | 
					@@ -18,6 +18,7 @@ package secret
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					import (
 | 
					 | 
					 | 
					 | 
					import (
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						"fmt"
 | 
					 | 
					 | 
					 | 
						"fmt"
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
						"strings"
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						"time"
 | 
					 | 
					 | 
					 | 
						"time"
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						"k8s.io/apimachinery/pkg/api/errors"
 | 
					 | 
					 | 
					 | 
						"k8s.io/apimachinery/pkg/api/errors"
 | 
				
			
			
		
	
	
		
		
			
				
					
					| 
						
					 | 
					 | 
					@@ -36,6 +37,7 @@ import (
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						"k8s.io/kubernetes/federation/pkg/federation-controller/util"
 | 
					 | 
					 | 
					 | 
						"k8s.io/kubernetes/federation/pkg/federation-controller/util"
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						"k8s.io/kubernetes/federation/pkg/federation-controller/util/deletionhelper"
 | 
					 | 
					 | 
					 | 
						"k8s.io/kubernetes/federation/pkg/federation-controller/util/deletionhelper"
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						"k8s.io/kubernetes/federation/pkg/federation-controller/util/eventsink"
 | 
					 | 
					 | 
					 | 
						"k8s.io/kubernetes/federation/pkg/federation-controller/util/eventsink"
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
						"k8s.io/kubernetes/federation/pkg/typeadapters"
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						"k8s.io/kubernetes/pkg/api"
 | 
					 | 
					 | 
					 | 
						"k8s.io/kubernetes/pkg/api"
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						apiv1 "k8s.io/kubernetes/pkg/api/v1"
 | 
					 | 
					 | 
					 | 
						apiv1 "k8s.io/kubernetes/pkg/api/v1"
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						kubeclientset "k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
 | 
					 | 
					 | 
					 | 
						kubeclientset "k8s.io/kubernetes/pkg/client/clientset_generated/clientset"
 | 
				
			
			
		
	
	
		
		
			
				
					
					| 
						
					 | 
					 | 
					@@ -53,185 +55,194 @@ var (
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						RequiredResources = []schema.GroupVersionResource{apiv1.SchemeGroupVersion.WithResource("secrets")}
 | 
					 | 
					 | 
					 | 
						RequiredResources = []schema.GroupVersionResource{apiv1.SchemeGroupVersion.WithResource("secrets")}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					)
 | 
					 | 
					 | 
					 | 
					)
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					type SecretController struct {
 | 
					 | 
					 | 
					 | 
					// FederationSyncController synchronizes the state of a federated type
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						// For triggering single secret reconciliation. This is used when there is an
 | 
					 | 
					 | 
					 | 
					// to clusters that are members of the federation.
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						// add/update/delete operation on a secret in either federated API server or
 | 
					 | 
					 | 
					 | 
					type FederationSyncController struct {
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						// in some member of the federation.
 | 
					 | 
					 | 
					 | 
						// For triggering reconciliation of a single resource. This is
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secretDeliverer *util.DelayingDeliverer
 | 
					 | 
					 | 
					 | 
						// used when there is an add/update/delete operation on a resource
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
						// in either federated API server or in some member of the
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
						// federation.
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
						deliverer *util.DelayingDeliverer
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						// For triggering all secrets reconciliation. This is used when
 | 
					 | 
					 | 
					 | 
						// For triggering reconciliation of all target resources. This is
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						// a new cluster becomes available.
 | 
					 | 
					 | 
					 | 
						// used when a new cluster becomes available.
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						clusterDeliverer *util.DelayingDeliverer
 | 
					 | 
					 | 
					 | 
						clusterDeliverer *util.DelayingDeliverer
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						// Contains secrets present in members of federation.
 | 
					 | 
					 | 
					 | 
						// Contains resources present in members of federation.
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secretFederatedInformer util.FederatedInformer
 | 
					 | 
					 | 
					 | 
						informer util.FederatedInformer
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						// For updating members of federation.
 | 
					 | 
					 | 
					 | 
						// For updating members of federation.
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						federatedUpdater util.FederatedUpdater
 | 
					 | 
					 | 
					 | 
						updater util.FederatedUpdater
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						// Definitions of secrets that should be federated.
 | 
					 | 
					 | 
					 | 
						// Definitions of resources that should be federated.
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secretInformerStore cache.Store
 | 
					 | 
					 | 
					 | 
						store cache.Store
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						// Informer controller for secrets that should be federated.
 | 
					 | 
					 | 
					 | 
						// Informer controller for resources that should be federated.
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secretInformerController cache.Controller
 | 
					 | 
					 | 
					 | 
						controller cache.Controller
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						// Client to federated api server.
 | 
					 | 
					 | 
					 | 
						// Backoff manager
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						federatedApiClient federationclientset.Interface
 | 
					 | 
					 | 
					 | 
						backoff *flowcontrol.Backoff
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						// Backoff manager for secrets
 | 
					 | 
					 | 
					 | 
					 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secretBackoff *flowcontrol.Backoff
 | 
					 | 
					 | 
					 | 
					 | 
				
			
			
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						// For events
 | 
					 | 
					 | 
					 | 
						// For events
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						eventRecorder record.EventRecorder
 | 
					 | 
					 | 
					 | 
						eventRecorder record.EventRecorder
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						deletionHelper *deletionhelper.DeletionHelper
 | 
					 | 
					 | 
					 | 
						deletionHelper *deletionhelper.DeletionHelper
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secretReviewDelay     time.Duration
 | 
					 | 
					 | 
					 | 
						reviewDelay           time.Duration
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						clusterAvailableDelay time.Duration
 | 
					 | 
					 | 
					 | 
						clusterAvailableDelay time.Duration
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						smallDelay            time.Duration
 | 
					 | 
					 | 
					 | 
						smallDelay            time.Duration
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						updateTimeout         time.Duration
 | 
					 | 
					 | 
					 | 
						updateTimeout         time.Duration
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
						adapter typeadapters.FederatedTypeAdapter
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					}
 | 
					 | 
					 | 
					 | 
					}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					// StartSecretController starts a new secret controller
 | 
					 | 
					 | 
					 | 
					// StartSecretController starts a new secret controller
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					func StartSecretController(config *restclient.Config, stopChan <-chan struct{}, minimizeLatency bool) {
 | 
					 | 
					 | 
					 | 
					func StartSecretController(config *restclient.Config, stopChan <-chan struct{}, minimizeLatency bool) {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						restclient.AddUserAgent(config, "secret-controller")
 | 
					 | 
					 | 
					 | 
						startFederationSyncController(&typeadapters.SecretAdapter{}, config, stopChan, minimizeLatency)
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						client := federationclientset.NewForConfigOrDie(config)
 | 
					 | 
					 | 
					 | 
					 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						controller := newSecretController(client)
 | 
					 | 
					 | 
					 | 
					 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						if minimizeLatency {
 | 
					 | 
					 | 
					 | 
					 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							controller.minimizeLatency()
 | 
					 | 
					 | 
					 | 
					 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}
 | 
					 | 
					 | 
					 | 
					 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						glog.Infof("Starting Secret controller")
 | 
					 | 
					 | 
					 | 
					 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						controller.Run(stopChan)
 | 
					 | 
					 | 
					 | 
					 | 
				
			
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					}
 | 
					 | 
					 | 
					 | 
					}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					// newSecretController returns a new secret controller
 | 
					 | 
					 | 
					 | 
					// newSecretController returns a new secret controller
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					func newSecretController(client federationclientset.Interface) *SecretController {
 | 
					 | 
					 | 
					 | 
					func newSecretController(client federationclientset.Interface) *FederationSyncController {
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
						return newFederationSyncController(client, typeadapters.NewSecretAdapter(client))
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					// startFederationSyncController starts a new sync controller for the given type adapter
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					func startFederationSyncController(adapter typeadapters.FederatedTypeAdapter, config *restclient.Config, stopChan <-chan struct{}, minimizeLatency bool) {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
						restclient.AddUserAgent(config, fmt.Sprintf("%s-controller", adapter.Kind()))
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
						client := federationclientset.NewForConfigOrDie(config)
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
						adapter.SetClient(client)
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
						controller := newFederationSyncController(client, adapter)
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
						if minimizeLatency {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
							controller.minimizeLatency()
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
						glog.Infof(fmt.Sprintf("Starting federated sync controller for %s resources", adapter.Kind()))
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
						controller.Run(stopChan)
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					// newFederationSyncController returns a new sync controller for the given client and type adapter
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					func newFederationSyncController(client federationclientset.Interface, adapter typeadapters.FederatedTypeAdapter) *FederationSyncController {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						broadcaster := record.NewBroadcaster()
 | 
					 | 
					 | 
					 | 
						broadcaster := record.NewBroadcaster()
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						broadcaster.StartRecordingToSink(eventsink.NewFederatedEventSink(client))
 | 
					 | 
					 | 
					 | 
						broadcaster.StartRecordingToSink(eventsink.NewFederatedEventSink(client))
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						recorder := broadcaster.NewRecorder(api.Scheme, clientv1.EventSource{Component: "federated-secrets-controller"})
 | 
					 | 
					 | 
					 | 
						recorder := broadcaster.NewRecorder(api.Scheme, clientv1.EventSource{Component: fmt.Sprintf("federated-%v-controller", adapter.Kind())})
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secretcontroller := &SecretController{
 | 
					 | 
					 | 
					 | 
						s := &FederationSyncController{
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							federatedApiClient:    client,
 | 
					 | 
					 | 
					 | 
							reviewDelay:           time.Second * 10,
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secretReviewDelay:     time.Second * 10,
 | 
					 | 
					 | 
					 | 
					 | 
				
			
			
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							clusterAvailableDelay: time.Second * 20,
 | 
					 | 
					 | 
					 | 
							clusterAvailableDelay: time.Second * 20,
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							smallDelay:            time.Second * 3,
 | 
					 | 
					 | 
					 | 
							smallDelay:            time.Second * 3,
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							updateTimeout:         time.Second * 30,
 | 
					 | 
					 | 
					 | 
							updateTimeout:         time.Second * 30,
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secretBackoff:         flowcontrol.NewBackOff(5*time.Second, time.Minute),
 | 
					 | 
					 | 
					 | 
							backoff:               flowcontrol.NewBackOff(5*time.Second, time.Minute),
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							eventRecorder:         recorder,
 | 
					 | 
					 | 
					 | 
							eventRecorder:         recorder,
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
							adapter:               adapter,
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}
 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						// Build delivereres for triggering reconciliations.
 | 
					 | 
					 | 
					 | 
						// Build delivereres for triggering reconciliations.
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secretcontroller.secretDeliverer = util.NewDelayingDeliverer()
 | 
					 | 
					 | 
					 | 
						s.deliverer = util.NewDelayingDeliverer()
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secretcontroller.clusterDeliverer = util.NewDelayingDeliverer()
 | 
					 | 
					 | 
					 | 
						s.clusterDeliverer = util.NewDelayingDeliverer()
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						// Start informer in federated API servers on secrets that should be federated.
 | 
					 | 
					 | 
					 | 
						// Start informer in federated API servers on the resource type that should be federated.
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secretcontroller.secretInformerStore, secretcontroller.secretInformerController = cache.NewInformer(
 | 
					 | 
					 | 
					 | 
						s.store, s.controller = cache.NewInformer(
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							&cache.ListWatch{
 | 
					 | 
					 | 
					 | 
							&cache.ListWatch{
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								ListFunc: func(options metav1.ListOptions) (pkgruntime.Object, error) {
 | 
					 | 
					 | 
					 | 
								ListFunc: func(options metav1.ListOptions) (pkgruntime.Object, error) {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
									return client.Core().Secrets(metav1.NamespaceAll).List(options)
 | 
					 | 
					 | 
					 | 
									return adapter.FedList(metav1.NamespaceAll, options)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								},
 | 
					 | 
					 | 
					 | 
								},
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								WatchFunc: func(options metav1.ListOptions) (watch.Interface, error) {
 | 
					 | 
					 | 
					 | 
								WatchFunc: func(options metav1.ListOptions) (watch.Interface, error) {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
									return client.Core().Secrets(metav1.NamespaceAll).Watch(options)
 | 
					 | 
					 | 
					 | 
									return adapter.FedWatch(metav1.NamespaceAll, options)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								},
 | 
					 | 
					 | 
					 | 
								},
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							},
 | 
					 | 
					 | 
					 | 
							},
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							&apiv1.Secret{},
 | 
					 | 
					 | 
					 | 
							adapter.ObjectType(),
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							controller.NoResyncPeriodFunc(),
 | 
					 | 
					 | 
					 | 
							controller.NoResyncPeriodFunc(),
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							util.NewTriggerOnAllChanges(func(obj pkgruntime.Object) { secretcontroller.deliverSecretObj(obj, 0, false) }))
 | 
					 | 
					 | 
					 | 
							util.NewTriggerOnAllChanges(func(obj pkgruntime.Object) { s.deliverObj(obj, 0, false) }))
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						// Federated informer on secrets in members of federation.
 | 
					 | 
					 | 
					 | 
						// Federated informer on the resource type in members of federation.
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secretcontroller.secretFederatedInformer = util.NewFederatedInformer(
 | 
					 | 
					 | 
					 | 
						s.informer = util.NewFederatedInformer(
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							client,
 | 
					 | 
					 | 
					 | 
							client,
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							func(cluster *federationapi.Cluster, targetClient kubeclientset.Interface) (cache.Store, cache.Controller) {
 | 
					 | 
					 | 
					 | 
							func(cluster *federationapi.Cluster, targetClient kubeclientset.Interface) (cache.Store, cache.Controller) {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								return cache.NewInformer(
 | 
					 | 
					 | 
					 | 
								return cache.NewInformer(
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
									&cache.ListWatch{
 | 
					 | 
					 | 
					 | 
									&cache.ListWatch{
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
										ListFunc: func(options metav1.ListOptions) (pkgruntime.Object, error) {
 | 
					 | 
					 | 
					 | 
										ListFunc: func(options metav1.ListOptions) (pkgruntime.Object, error) {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
											return targetClient.Core().Secrets(metav1.NamespaceAll).List(options)
 | 
					 | 
					 | 
					 | 
											return adapter.ClusterList(targetClient, metav1.NamespaceAll, options)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
										},
 | 
					 | 
					 | 
					 | 
										},
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
										WatchFunc: func(options metav1.ListOptions) (watch.Interface, error) {
 | 
					 | 
					 | 
					 | 
										WatchFunc: func(options metav1.ListOptions) (watch.Interface, error) {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
											return targetClient.Core().Secrets(metav1.NamespaceAll).Watch(options)
 | 
					 | 
					 | 
					 | 
											return adapter.ClusterWatch(targetClient, metav1.NamespaceAll, options)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
										},
 | 
					 | 
					 | 
					 | 
										},
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
									},
 | 
					 | 
					 | 
					 | 
									},
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
									&apiv1.Secret{},
 | 
					 | 
					 | 
					 | 
									adapter.ObjectType(),
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
									controller.NoResyncPeriodFunc(),
 | 
					 | 
					 | 
					 | 
									controller.NoResyncPeriodFunc(),
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
									// Trigger reconciliation whenever something in federated cluster is changed. In most cases it
 | 
					 | 
					 | 
					 | 
									// Trigger reconciliation whenever something in federated cluster is changed. In most cases it
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
									// would be just confirmation that some secret operation succeeded.
 | 
					 | 
					 | 
					 | 
									// would be just confirmation that some operation on the target resource type had succeeded.
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
									util.NewTriggerOnAllChanges(
 | 
					 | 
					 | 
					 | 
									util.NewTriggerOnAllChanges(
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
										func(obj pkgruntime.Object) {
 | 
					 | 
					 | 
					 | 
										func(obj pkgruntime.Object) {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
											secretcontroller.deliverSecretObj(obj, secretcontroller.secretReviewDelay, false)
 | 
					 | 
					 | 
					 | 
											s.deliverObj(obj, s.reviewDelay, false)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
										},
 | 
					 | 
					 | 
					 | 
										},
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
									))
 | 
					 | 
					 | 
					 | 
									))
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							},
 | 
					 | 
					 | 
					 | 
							},
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							&util.ClusterLifecycleHandlerFuncs{
 | 
					 | 
					 | 
					 | 
							&util.ClusterLifecycleHandlerFuncs{
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								ClusterAvailable: func(cluster *federationapi.Cluster) {
 | 
					 | 
					 | 
					 | 
								ClusterAvailable: func(cluster *federationapi.Cluster) {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
									// When new cluster becomes available process all the secrets again.
 | 
					 | 
					 | 
					 | 
									// When new cluster becomes available process all the target resources again.
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
									secretcontroller.clusterDeliverer.DeliverAt(allClustersKey, nil, time.Now().Add(secretcontroller.clusterAvailableDelay))
 | 
					 | 
					 | 
					 | 
									s.clusterDeliverer.DeliverAt(allClustersKey, nil, time.Now().Add(s.clusterAvailableDelay))
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								},
 | 
					 | 
					 | 
					 | 
								},
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							},
 | 
					 | 
					 | 
					 | 
							},
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						)
 | 
					 | 
					 | 
					 | 
						)
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						// Federated updeater along with Create/Update/Delete operations.
 | 
					 | 
					 | 
					 | 
						// Federated updeater along with Create/Update/Delete operations.
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secretcontroller.federatedUpdater = util.NewFederatedUpdater(secretcontroller.secretFederatedInformer,
 | 
					 | 
					 | 
					 | 
						s.updater = util.NewFederatedUpdater(s.informer,
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							func(client kubeclientset.Interface, obj pkgruntime.Object) error {
 | 
					 | 
					 | 
					 | 
							func(client kubeclientset.Interface, obj pkgruntime.Object) error {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								secret := obj.(*apiv1.Secret)
 | 
					 | 
					 | 
					 | 
								_, err := adapter.ClusterCreate(client, obj)
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								_, err := client.Core().Secrets(secret.Namespace).Create(secret)
 | 
					 | 
					 | 
					 | 
					 | 
				
			
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								return err
 | 
					 | 
					 | 
					 | 
								return err
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							},
 | 
					 | 
					 | 
					 | 
							},
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							func(client kubeclientset.Interface, obj pkgruntime.Object) error {
 | 
					 | 
					 | 
					 | 
							func(client kubeclientset.Interface, obj pkgruntime.Object) error {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								secret := obj.(*apiv1.Secret)
 | 
					 | 
					 | 
					 | 
								_, err := adapter.ClusterUpdate(client, obj)
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								_, err := client.Core().Secrets(secret.Namespace).Update(secret)
 | 
					 | 
					 | 
					 | 
					 | 
				
			
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								return err
 | 
					 | 
					 | 
					 | 
								return err
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							},
 | 
					 | 
					 | 
					 | 
							},
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							func(client kubeclientset.Interface, obj pkgruntime.Object) error {
 | 
					 | 
					 | 
					 | 
							func(client kubeclientset.Interface, obj pkgruntime.Object) error {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								secret := obj.(*apiv1.Secret)
 | 
					 | 
					 | 
					 | 
								namespacedName := adapter.NamespacedName(obj)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								orphanDependents := false
 | 
					 | 
					 | 
					 | 
								orphanDependents := false
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								err := client.Core().Secrets(secret.Namespace).Delete(secret.Name, &metav1.DeleteOptions{OrphanDependents: &orphanDependents})
 | 
					 | 
					 | 
					 | 
								err := adapter.ClusterDelete(client, namespacedName, &metav1.DeleteOptions{OrphanDependents: &orphanDependents})
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								return err
 | 
					 | 
					 | 
					 | 
								return err
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							})
 | 
					 | 
					 | 
					 | 
							})
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secretcontroller.deletionHelper = deletionhelper.NewDeletionHelper(
 | 
					 | 
					 | 
					 | 
						s.deletionHelper = deletionhelper.NewDeletionHelper(
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secretcontroller.hasFinalizerFunc,
 | 
					 | 
					 | 
					 | 
							s.hasFinalizerFunc,
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secretcontroller.removeFinalizerFunc,
 | 
					 | 
					 | 
					 | 
							s.removeFinalizerFunc,
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secretcontroller.addFinalizerFunc,
 | 
					 | 
					 | 
					 | 
							s.addFinalizerFunc,
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							// objNameFunc
 | 
					 | 
					 | 
					 | 
							// objNameFunc
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							func(obj pkgruntime.Object) string {
 | 
					 | 
					 | 
					 | 
							func(obj pkgruntime.Object) string {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								secret := obj.(*apiv1.Secret)
 | 
					 | 
					 | 
					 | 
								return adapter.ObjectMeta(obj).Name
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								return secret.Name
 | 
					 | 
					 | 
					 | 
					 | 
				
			
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							},
 | 
					 | 
					 | 
					 | 
							},
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secretcontroller.updateTimeout,
 | 
					 | 
					 | 
					 | 
							s.updateTimeout,
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secretcontroller.eventRecorder,
 | 
					 | 
					 | 
					 | 
							s.eventRecorder,
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secretcontroller.secretFederatedInformer,
 | 
					 | 
					 | 
					 | 
							s.informer,
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secretcontroller.federatedUpdater,
 | 
					 | 
					 | 
					 | 
							s.updater,
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						)
 | 
					 | 
					 | 
					 | 
						)
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						return secretcontroller
 | 
					 | 
					 | 
					 | 
						return s
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					}
 | 
					 | 
					 | 
					 | 
					}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					// minimizeLatency reduces delays and timeouts to make the controller more responsive (useful for testing).
 | 
					 | 
					 | 
					 | 
					// minimizeLatency reduces delays and timeouts to make the controller more responsive (useful for testing).
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					func (secretcontroller *SecretController) minimizeLatency() {
 | 
					 | 
					 | 
					 | 
					func (s *FederationSyncController) minimizeLatency() {
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secretcontroller.clusterAvailableDelay = time.Second
 | 
					 | 
					 | 
					 | 
						s.clusterAvailableDelay = time.Second
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secretcontroller.secretReviewDelay = 50 * time.Millisecond
 | 
					 | 
					 | 
					 | 
						s.reviewDelay = 50 * time.Millisecond
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secretcontroller.smallDelay = 20 * time.Millisecond
 | 
					 | 
					 | 
					 | 
						s.smallDelay = 20 * time.Millisecond
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secretcontroller.updateTimeout = 5 * time.Second
 | 
					 | 
					 | 
					 | 
						s.updateTimeout = 5 * time.Second
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					}
 | 
					 | 
					 | 
					 | 
					}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					// Returns true if the given object has the given finalizer in its ObjectMeta.
 | 
					 | 
					 | 
					 | 
					// Returns true if the given object has the given finalizer in its ObjectMeta.
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					func (secretcontroller *SecretController) hasFinalizerFunc(obj pkgruntime.Object, finalizer string) bool {
 | 
					 | 
					 | 
					 | 
					func (s *FederationSyncController) hasFinalizerFunc(obj pkgruntime.Object, finalizer string) bool {
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secret := obj.(*apiv1.Secret)
 | 
					 | 
					 | 
					 | 
						meta := s.adapter.ObjectMeta(obj)
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						for i := range secret.ObjectMeta.Finalizers {
 | 
					 | 
					 | 
					 | 
						for i := range meta.Finalizers {
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							if string(secret.ObjectMeta.Finalizers[i]) == finalizer {
 | 
					 | 
					 | 
					 | 
							if string(meta.Finalizers[i]) == finalizer {
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								return true
 | 
					 | 
					 | 
					 | 
								return true
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							}
 | 
					 | 
					 | 
					 | 
							}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}
 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						return false
 | 
					 | 
					 | 
					 | 
						return false
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					}
 | 
					 | 
					 | 
					 | 
					}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					// Removes the finalizers from the given objects ObjectMeta.
 | 
					 | 
					 | 
					 | 
					// Removes the finalizer from the given objects ObjectMeta.
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					// Assumes that the given object is a secret.
 | 
					 | 
					 | 
					 | 
					func (s *FederationSyncController) removeFinalizerFunc(obj pkgruntime.Object, finalizers []string) (pkgruntime.Object, error) {
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					func (secretcontroller *SecretController) removeFinalizerFunc(obj pkgruntime.Object, finalizers []string) (pkgruntime.Object, error) {
 | 
					 | 
					 | 
					 | 
						meta := s.adapter.ObjectMeta(obj)
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secret := obj.(*apiv1.Secret)
 | 
					 | 
					 | 
					 | 
					 | 
				
			
			
		
	
		
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						newFinalizers := []string{}
 | 
					 | 
					 | 
					 | 
						newFinalizers := []string{}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						hasFinalizer := false
 | 
					 | 
					 | 
					 | 
						hasFinalizer := false
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						for i := range secret.ObjectMeta.Finalizers {
 | 
					 | 
					 | 
					 | 
						for i := range meta.Finalizers {
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							if !deletionhelper.ContainsString(finalizers, secret.ObjectMeta.Finalizers[i]) {
 | 
					 | 
					 | 
					 | 
							if !deletionhelper.ContainsString(finalizers, meta.Finalizers[i]) {
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								newFinalizers = append(newFinalizers, secret.ObjectMeta.Finalizers[i])
 | 
					 | 
					 | 
					 | 
								newFinalizers = append(newFinalizers, meta.Finalizers[i])
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							} else {
 | 
					 | 
					 | 
					 | 
							} else {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								hasFinalizer = true
 | 
					 | 
					 | 
					 | 
								hasFinalizer = true
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							}
 | 
					 | 
					 | 
					 | 
							}
 | 
				
			
			
		
	
	
		
		
			
				
					
					| 
						
					 | 
					 | 
					@@ -240,184 +251,185 @@ func (secretcontroller *SecretController) removeFinalizerFunc(obj pkgruntime.Obj
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							// Nothing to do.
 | 
					 | 
					 | 
					 | 
							// Nothing to do.
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							return obj, nil
 | 
					 | 
					 | 
					 | 
							return obj, nil
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}
 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secret.ObjectMeta.Finalizers = newFinalizers
 | 
					 | 
					 | 
					 | 
						meta.Finalizers = newFinalizers
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secret, err := secretcontroller.federatedApiClient.Core().Secrets(secret.Namespace).Update(secret)
 | 
					 | 
					 | 
					 | 
						secret, err := s.adapter.FedUpdate(obj)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						if err != nil {
 | 
					 | 
					 | 
					 | 
						if err != nil {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							return nil, fmt.Errorf("failed to remove finalizers %v from secret %s: %v", finalizers, secret.Name, err)
 | 
					 | 
					 | 
					 | 
							return nil, fmt.Errorf("failed to remove finalizers %v from %s %s: %v", finalizers, s.adapter.Kind(), meta.Name, err)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}
 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						return secret, nil
 | 
					 | 
					 | 
					 | 
						return secret, nil
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					}
 | 
					 | 
					 | 
					 | 
					}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					// Adds the given finalizers to the given objects ObjectMeta.
 | 
					 | 
					 | 
					 | 
					// Adds the given finalizers to the given objects ObjectMeta.
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					// Assumes that the given object is a secret.
 | 
					 | 
					 | 
					 | 
					func (s *FederationSyncController) addFinalizerFunc(obj pkgruntime.Object, finalizers []string) (pkgruntime.Object, error) {
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					func (secretcontroller *SecretController) addFinalizerFunc(obj pkgruntime.Object, finalizers []string) (pkgruntime.Object, error) {
 | 
					 | 
					 | 
					 | 
						meta := s.adapter.ObjectMeta(obj)
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secret := obj.(*apiv1.Secret)
 | 
					 | 
					 | 
					 | 
						meta.Finalizers = append(meta.Finalizers, finalizers...)
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secret.ObjectMeta.Finalizers = append(secret.ObjectMeta.Finalizers, finalizers...)
 | 
					 | 
					 | 
					 | 
						secret, err := s.adapter.FedUpdate(obj)
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secret, err := secretcontroller.federatedApiClient.Core().Secrets(secret.Namespace).Update(secret)
 | 
					 | 
					 | 
					 | 
					 | 
				
			
			
		
	
		
		
	
		
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						if err != nil {
 | 
					 | 
					 | 
					 | 
						if err != nil {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							return nil, fmt.Errorf("failed to add finalizers %v to secret %s: %v", finalizers, secret.Name, err)
 | 
					 | 
					 | 
					 | 
							return nil, fmt.Errorf("failed to add finalizers %v to %s %s: %v", finalizers, s.adapter.Kind(), meta.Name, err)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}
 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						return secret, nil
 | 
					 | 
					 | 
					 | 
						return secret, nil
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					}
 | 
					 | 
					 | 
					 | 
					}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					func (secretcontroller *SecretController) Run(stopChan <-chan struct{}) {
 | 
					 | 
					 | 
					 | 
					func (s *FederationSyncController) Run(stopChan <-chan struct{}) {
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						go secretcontroller.secretInformerController.Run(stopChan)
 | 
					 | 
					 | 
					 | 
						go s.controller.Run(stopChan)
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secretcontroller.secretFederatedInformer.Start()
 | 
					 | 
					 | 
					 | 
						s.informer.Start()
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						go func() {
 | 
					 | 
					 | 
					 | 
						go func() {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							<-stopChan
 | 
					 | 
					 | 
					 | 
							<-stopChan
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secretcontroller.secretFederatedInformer.Stop()
 | 
					 | 
					 | 
					 | 
							s.informer.Stop()
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}()
 | 
					 | 
					 | 
					 | 
						}()
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secretcontroller.secretDeliverer.StartWithHandler(func(item *util.DelayingDelivererItem) {
 | 
					 | 
					 | 
					 | 
						s.deliverer.StartWithHandler(func(item *util.DelayingDelivererItem) {
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secret := item.Value.(*types.NamespacedName)
 | 
					 | 
					 | 
					 | 
							namespacedName := item.Value.(*types.NamespacedName)
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secretcontroller.reconcileSecret(*secret)
 | 
					 | 
					 | 
					 | 
							s.reconcile(*namespacedName)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						})
 | 
					 | 
					 | 
					 | 
						})
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secretcontroller.clusterDeliverer.StartWithHandler(func(_ *util.DelayingDelivererItem) {
 | 
					 | 
					 | 
					 | 
						s.clusterDeliverer.StartWithHandler(func(_ *util.DelayingDelivererItem) {
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secretcontroller.reconcileSecretsOnClusterChange()
 | 
					 | 
					 | 
					 | 
							s.reconcileOnClusterChange()
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						})
 | 
					 | 
					 | 
					 | 
						})
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						util.StartBackoffGC(secretcontroller.secretBackoff, stopChan)
 | 
					 | 
					 | 
					 | 
						util.StartBackoffGC(s.backoff, stopChan)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					}
 | 
					 | 
					 | 
					 | 
					}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					func (secretcontroller *SecretController) deliverSecretObj(obj interface{}, delay time.Duration, failed bool) {
 | 
					 | 
					 | 
					 | 
					func (s *FederationSyncController) deliverObj(obj pkgruntime.Object, delay time.Duration, failed bool) {
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secret := obj.(*apiv1.Secret)
 | 
					 | 
					 | 
					 | 
						namespacedName := s.adapter.NamespacedName(obj)
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secretcontroller.deliverSecret(types.NamespacedName{Namespace: secret.Namespace, Name: secret.Name}, delay, failed)
 | 
					 | 
					 | 
					 | 
						s.deliver(namespacedName, delay, failed)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					}
 | 
					 | 
					 | 
					 | 
					}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					// Adds backoff to delay if this delivery is related to some failure. Resets backoff if there was no failure.
 | 
					 | 
					 | 
					 | 
					// Adds backoff to delay if this delivery is related to some failure. Resets backoff if there was no failure.
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					func (secretcontroller *SecretController) deliverSecret(secret types.NamespacedName, delay time.Duration, failed bool) {
 | 
					 | 
					 | 
					 | 
					func (s *FederationSyncController) deliver(namespacedName types.NamespacedName, delay time.Duration, failed bool) {
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						key := secret.String()
 | 
					 | 
					 | 
					 | 
						key := namespacedName.String()
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						if failed {
 | 
					 | 
					 | 
					 | 
						if failed {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secretcontroller.secretBackoff.Next(key, time.Now())
 | 
					 | 
					 | 
					 | 
							s.backoff.Next(key, time.Now())
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							delay = delay + secretcontroller.secretBackoff.Get(key)
 | 
					 | 
					 | 
					 | 
							delay = delay + s.backoff.Get(key)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						} else {
 | 
					 | 
					 | 
					 | 
						} else {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secretcontroller.secretBackoff.Reset(key)
 | 
					 | 
					 | 
					 | 
							s.backoff.Reset(key)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}
 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secretcontroller.secretDeliverer.DeliverAfter(key, &secret, delay)
 | 
					 | 
					 | 
					 | 
						s.deliverer.DeliverAfter(key, &namespacedName, delay)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					}
 | 
					 | 
					 | 
					 | 
					}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					// Check whether all data stores are in sync. False is returned if any of the informer/stores is not yet
 | 
					 | 
					 | 
					 | 
					// Check whether all data stores are in sync. False is returned if any of the informer/stores is not yet
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					// synced with the corresponding api server.
 | 
					 | 
					 | 
					 | 
					// synced with the corresponding api server.
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					func (secretcontroller *SecretController) isSynced() bool {
 | 
					 | 
					 | 
					 | 
					func (s *FederationSyncController) isSynced() bool {
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						if !secretcontroller.secretFederatedInformer.ClustersSynced() {
 | 
					 | 
					 | 
					 | 
						if !s.informer.ClustersSynced() {
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							glog.V(2).Infof("Cluster list not synced")
 | 
					 | 
					 | 
					 | 
							glog.V(2).Infof("Cluster list not synced")
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							return false
 | 
					 | 
					 | 
					 | 
							return false
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}
 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						clusters, err := secretcontroller.secretFederatedInformer.GetReadyClusters()
 | 
					 | 
					 | 
					 | 
						clusters, err := s.informer.GetReadyClusters()
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						if err != nil {
 | 
					 | 
					 | 
					 | 
						if err != nil {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							glog.Errorf("Failed to get ready clusters: %v", err)
 | 
					 | 
					 | 
					 | 
							glog.Errorf("Failed to get ready clusters: %v", err)
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							return false
 | 
					 | 
					 | 
					 | 
							return false
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}
 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						if !secretcontroller.secretFederatedInformer.GetTargetStore().ClustersSynced(clusters) {
 | 
					 | 
					 | 
					 | 
						if !s.informer.GetTargetStore().ClustersSynced(clusters) {
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							return false
 | 
					 | 
					 | 
					 | 
							return false
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}
 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						return true
 | 
					 | 
					 | 
					 | 
						return true
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					}
 | 
					 | 
					 | 
					 | 
					}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					// The function triggers reconciliation of all federated secrets.
 | 
					 | 
					 | 
					 | 
					// The function triggers reconciliation of all target federated resources.
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					func (secretcontroller *SecretController) reconcileSecretsOnClusterChange() {
 | 
					 | 
					 | 
					 | 
					func (s *FederationSyncController) reconcileOnClusterChange() {
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						if !secretcontroller.isSynced() {
 | 
					 | 
					 | 
					 | 
						if !s.isSynced() {
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secretcontroller.clusterDeliverer.DeliverAt(allClustersKey, nil, time.Now().Add(secretcontroller.clusterAvailableDelay))
 | 
					 | 
					 | 
					 | 
							s.clusterDeliverer.DeliverAt(allClustersKey, nil, time.Now().Add(s.clusterAvailableDelay))
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}
 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						for _, obj := range secretcontroller.secretInformerStore.List() {
 | 
					 | 
					 | 
					 | 
						for _, obj := range s.store.List() {
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secret := obj.(*apiv1.Secret)
 | 
					 | 
					 | 
					 | 
							namespacedName := s.adapter.NamespacedName(obj.(pkgruntime.Object))
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secretcontroller.deliverSecret(types.NamespacedName{Namespace: secret.Namespace, Name: secret.Name}, secretcontroller.smallDelay, false)
 | 
					 | 
					 | 
					 | 
							s.deliver(namespacedName, s.smallDelay, false)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}
 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					}
 | 
					 | 
					 | 
					 | 
					}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					func (secretcontroller *SecretController) reconcileSecret(secret types.NamespacedName) {
 | 
					 | 
					 | 
					 | 
					func (s *FederationSyncController) reconcile(namespacedName types.NamespacedName) {
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						if !secretcontroller.isSynced() {
 | 
					 | 
					 | 
					 | 
						if !s.isSynced() {
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secretcontroller.deliverSecret(secret, secretcontroller.clusterAvailableDelay, false)
 | 
					 | 
					 | 
					 | 
							s.deliver(namespacedName, s.clusterAvailableDelay, false)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							return
 | 
					 | 
					 | 
					 | 
							return
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}
 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						key := secret.String()
 | 
					 | 
					 | 
					 | 
						key := namespacedName.String()
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						baseSecretObjFromStore, exist, err := secretcontroller.secretInformerStore.GetByKey(key)
 | 
					 | 
					 | 
					 | 
						kind := s.adapter.Kind()
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
						cachedObj, exist, err := s.store.GetByKey(key)
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						if err != nil {
 | 
					 | 
					 | 
					 | 
						if err != nil {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							glog.Errorf("Failed to query main secret store for %v: %v", key, err)
 | 
					 | 
					 | 
					 | 
							glog.Errorf("Failed to query main %s store for %v: %v", kind, key, err)
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secretcontroller.deliverSecret(secret, 0, true)
 | 
					 | 
					 | 
					 | 
							s.deliver(namespacedName, 0, true)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							return
 | 
					 | 
					 | 
					 | 
							return
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}
 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						if !exist {
 | 
					 | 
					 | 
					 | 
						if !exist {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							// Not federated secret, ignoring.
 | 
					 | 
					 | 
					 | 
							// Not federated, ignoring.
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							return
 | 
					 | 
					 | 
					 | 
							return
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}
 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						// Create a copy before modifying the obj to prevent race condition with
 | 
					 | 
					 | 
					 | 
						// Create a copy before modifying the resource to prevent racing
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						// other readers of obj from store.
 | 
					 | 
					 | 
					 | 
						// with other readers.
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						baseSecretObj, err := api.Scheme.DeepCopy(baseSecretObjFromStore)
 | 
					 | 
					 | 
					 | 
						copiedObj, err := api.Scheme.DeepCopy(cachedObj)
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						baseSecret, ok := baseSecretObj.(*apiv1.Secret)
 | 
					 | 
					 | 
					 | 
						if err != nil {
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						if err != nil || !ok {
 | 
					 | 
					 | 
					 | 
							glog.Errorf("Error in retrieving %s from store: %v", kind, err)
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							glog.Errorf("Error in retrieving obj from store: %v, %v", ok, err)
 | 
					 | 
					 | 
					 | 
							s.deliver(namespacedName, 0, true)
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secretcontroller.deliverSecret(secret, 0, true)
 | 
					 | 
					 | 
					 | 
					 | 
				
			
			
		
	
		
		
	
		
		
	
		
		
	
		
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							return
 | 
					 | 
					 | 
					 | 
							return
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}
 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						if baseSecret.DeletionTimestamp != nil {
 | 
					 | 
					 | 
					 | 
						if !s.adapter.IsExpectedType(copiedObj) {
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							if err := secretcontroller.delete(baseSecret); err != nil {
 | 
					 | 
					 | 
					 | 
							glog.Errorf("Object is not the expected type: %v", copiedObj)
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								glog.Errorf("Failed to delete %s: %v", secret, err)
 | 
					 | 
					 | 
					 | 
							s.deliver(namespacedName, 0, true)
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								secretcontroller.eventRecorder.Eventf(baseSecret, api.EventTypeNormal, "DeleteFailed",
 | 
					 | 
					 | 
					 | 
							return
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
									"Secret delete failed: %v", err)
 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								secretcontroller.deliverSecret(secret, 0, true)
 | 
					 | 
					 | 
					 | 
						obj := copiedObj.(pkgruntime.Object)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
	
		
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
						meta := s.adapter.ObjectMeta(obj)
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
						if meta.DeletionTimestamp != nil {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
							if err := s.delete(obj, namespacedName); err != nil {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
								glog.Errorf("Failed to delete %s %s: %v", kind, namespacedName, err)
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
								s.eventRecorder.Eventf(obj, api.EventTypeNormal, "DeleteFailed",
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
									"%s delete failed: %v", strings.ToTitle(kind), err)
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
								s.deliver(namespacedName, 0, true)
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							}
 | 
					 | 
					 | 
					 | 
							}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							return
 | 
					 | 
					 | 
					 | 
							return
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}
 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						glog.V(3).Infof("Ensuring delete object from underlying clusters finalizer for secret: %s",
 | 
					 | 
					 | 
					 | 
						glog.V(3).Infof("Ensuring delete object from underlying clusters finalizer for %s: %s",
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							baseSecret.Name)
 | 
					 | 
					 | 
					 | 
							kind, namespacedName)
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						// Add the required finalizers before creating a secret in underlying clusters.
 | 
					 | 
					 | 
					 | 
						// Add the required finalizers before creating the resource in underlying clusters.
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						updatedSecretObj, err := secretcontroller.deletionHelper.EnsureFinalizers(baseSecret)
 | 
					 | 
					 | 
					 | 
						obj, err = s.deletionHelper.EnsureFinalizers(obj)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						if err != nil {
 | 
					 | 
					 | 
					 | 
						if err != nil {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							glog.Errorf("Failed to ensure delete object from underlying clusters finalizer in secret %s: %v",
 | 
					 | 
					 | 
					 | 
							glog.Errorf("Failed to ensure delete object from underlying clusters finalizer in %s %s: %v",
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								baseSecret.Name, err)
 | 
					 | 
					 | 
					 | 
								kind, namespacedName, err)
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secretcontroller.deliverSecret(secret, 0, false)
 | 
					 | 
					 | 
					 | 
							s.deliver(namespacedName, 0, false)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							return
 | 
					 | 
					 | 
					 | 
							return
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}
 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						baseSecret = updatedSecretObj.(*apiv1.Secret)
 | 
					 | 
					 | 
					 | 
					 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						glog.V(3).Infof("Syncing secret %s in underlying clusters", baseSecret.Name)
 | 
					 | 
					 | 
					 | 
						glog.V(3).Infof("Syncing %s %s in underlying clusters", kind, namespacedName)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						clusters, err := secretcontroller.secretFederatedInformer.GetReadyClusters()
 | 
					 | 
					 | 
					 | 
						clusters, err := s.informer.GetReadyClusters()
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						if err != nil {
 | 
					 | 
					 | 
					 | 
						if err != nil {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							glog.Errorf("Failed to get cluster list: %v", err)
 | 
					 | 
					 | 
					 | 
							glog.Errorf("Failed to get cluster list: %v", err)
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secretcontroller.deliverSecret(secret, secretcontroller.clusterAvailableDelay, false)
 | 
					 | 
					 | 
					 | 
							s.deliver(namespacedName, s.clusterAvailableDelay, false)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							return
 | 
					 | 
					 | 
					 | 
							return
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}
 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						operations := make([]util.FederatedOperation, 0)
 | 
					 | 
					 | 
					 | 
						operations := make([]util.FederatedOperation, 0)
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						for _, cluster := range clusters {
 | 
					 | 
					 | 
					 | 
						for _, cluster := range clusters {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							clusterSecretObj, found, err := secretcontroller.secretFederatedInformer.GetTargetStore().GetByKey(cluster.Name, key)
 | 
					 | 
					 | 
					 | 
							clusterObj, found, err := s.informer.GetTargetStore().GetByKey(cluster.Name, key)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							if err != nil {
 | 
					 | 
					 | 
					 | 
							if err != nil {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								glog.Errorf("Failed to get %s from %s: %v", key, cluster.Name, err)
 | 
					 | 
					 | 
					 | 
								glog.Errorf("Failed to get %s from %s: %v", key, cluster.Name, err)
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								secretcontroller.deliverSecret(secret, 0, true)
 | 
					 | 
					 | 
					 | 
								s.deliver(namespacedName, 0, true)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								return
 | 
					 | 
					 | 
					 | 
								return
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							}
 | 
					 | 
					 | 
					 | 
							}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							// The data should not be modified.
 | 
					 | 
					 | 
					 | 
							// The data should not be modified.
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							desiredSecret := &apiv1.Secret{
 | 
					 | 
					 | 
					 | 
							desiredObj := s.adapter.Copy(obj)
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								ObjectMeta: util.DeepCopyRelevantObjectMeta(baseSecret.ObjectMeta),
 | 
					 | 
					 | 
					 | 
					 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								Data:       baseSecret.Data,
 | 
					 | 
					 | 
					 | 
					 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								Type:       baseSecret.Type,
 | 
					 | 
					 | 
					 | 
					 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							}
 | 
					 | 
					 | 
					 | 
					 | 
				
			
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							if !found {
 | 
					 | 
					 | 
					 | 
							if !found {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								secretcontroller.eventRecorder.Eventf(baseSecret, api.EventTypeNormal, "CreateInCluster",
 | 
					 | 
					 | 
					 | 
								s.eventRecorder.Eventf(obj, api.EventTypeNormal, "CreateInCluster",
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
									"Creating secret in cluster %s", cluster.Name)
 | 
					 | 
					 | 
					 | 
									"Creating %s in cluster %s", kind, cluster.Name)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								operations = append(operations, util.FederatedOperation{
 | 
					 | 
					 | 
					 | 
								operations = append(operations, util.FederatedOperation{
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
									Type:        util.OperationTypeAdd,
 | 
					 | 
					 | 
					 | 
									Type:        util.OperationTypeAdd,
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
									Obj:         desiredSecret,
 | 
					 | 
					 | 
					 | 
									Obj:         desiredObj,
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
									ClusterName: cluster.Name,
 | 
					 | 
					 | 
					 | 
									ClusterName: cluster.Name,
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								})
 | 
					 | 
					 | 
					 | 
								})
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							} else {
 | 
					 | 
					 | 
					 | 
							} else {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								clusterSecret := clusterSecretObj.(*apiv1.Secret)
 | 
					 | 
					 | 
					 | 
								clusterObj := clusterObj.(pkgruntime.Object)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								// Update existing secret, if needed.
 | 
					 | 
					 | 
					 | 
								// Update existing resource, if needed.
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								if !util.SecretEquivalent(*desiredSecret, *clusterSecret) {
 | 
					 | 
					 | 
					 | 
								if !s.adapter.Equivalent(desiredObj, clusterObj) {
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
									s.eventRecorder.Eventf(obj, api.EventTypeNormal, "UpdateInCluster",
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
									secretcontroller.eventRecorder.Eventf(baseSecret, api.EventTypeNormal, "UpdateInCluster",
 | 
					 | 
					 | 
					 | 
										"Updating %s in cluster %s", kind, cluster.Name)
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
										"Updating secret in cluster %s", cluster.Name)
 | 
					 | 
					 | 
					 | 
					 | 
				
			
			
		
	
		
		
	
		
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
									operations = append(operations, util.FederatedOperation{
 | 
					 | 
					 | 
					 | 
									operations = append(operations, util.FederatedOperation{
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
										Type:        util.OperationTypeUpdate,
 | 
					 | 
					 | 
					 | 
										Type:        util.OperationTypeUpdate,
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
										Obj:         desiredSecret,
 | 
					 | 
					 | 
					 | 
										Obj:         desiredObj,
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
										ClusterName: cluster.Name,
 | 
					 | 
					 | 
					 | 
										ClusterName: cluster.Name,
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
									})
 | 
					 | 
					 | 
					 | 
									})
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								}
 | 
					 | 
					 | 
					 | 
								}
 | 
				
			
			
		
	
	
		
		
			
				
					
					| 
						
					 | 
					 | 
					@@ -428,37 +440,38 @@ func (secretcontroller *SecretController) reconcileSecret(secret types.Namespace
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							// Everything is in order
 | 
					 | 
					 | 
					 | 
							// Everything is in order
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							return
 | 
					 | 
					 | 
					 | 
							return
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}
 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						err = secretcontroller.federatedUpdater.UpdateWithOnError(operations, secretcontroller.updateTimeout,
 | 
					 | 
					 | 
					 | 
						err = s.updater.UpdateWithOnError(operations, s.updateTimeout,
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							func(op util.FederatedOperation, operror error) {
 | 
					 | 
					 | 
					 | 
							func(op util.FederatedOperation, operror error) {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								secretcontroller.eventRecorder.Eventf(baseSecret, api.EventTypeNormal, "UpdateInClusterFailed",
 | 
					 | 
					 | 
					 | 
								s.eventRecorder.Eventf(obj, api.EventTypeNormal, "UpdateInClusterFailed",
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
									"Secret update in cluster %s failed: %v", op.ClusterName, operror)
 | 
					 | 
					 | 
					 | 
									"%s update in cluster %s failed: %v", strings.ToTitle(kind), op.ClusterName, operror)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							})
 | 
					 | 
					 | 
					 | 
							})
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						if err != nil {
 | 
					 | 
					 | 
					 | 
						if err != nil {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							glog.Errorf("Failed to execute updates for %s: %v", key, err)
 | 
					 | 
					 | 
					 | 
							glog.Errorf("Failed to execute updates for %s: %v", key, err)
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							secretcontroller.deliverSecret(secret, 0, true)
 | 
					 | 
					 | 
					 | 
							s.deliver(namespacedName, 0, true)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							return
 | 
					 | 
					 | 
					 | 
							return
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}
 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						// Evertyhing is in order but lets be double sure
 | 
					 | 
					 | 
					 | 
						// Evertyhing is in order but lets be double sure
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						secretcontroller.deliverSecret(secret, secretcontroller.secretReviewDelay, false)
 | 
					 | 
					 | 
					 | 
						s.deliver(namespacedName, s.reviewDelay, false)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					}
 | 
					 | 
					 | 
					 | 
					}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					// delete deletes the given secret or returns error if the deletion was not complete.
 | 
					 | 
					 | 
					 | 
					// delete deletes the given resource or returns error if the deletion was not complete.
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					func (secretcontroller *SecretController) delete(secret *apiv1.Secret) error {
 | 
					 | 
					 | 
					 | 
					func (s *FederationSyncController) delete(obj pkgruntime.Object, namespacedName types.NamespacedName) error {
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						glog.V(3).Infof("Handling deletion of secret: %v", *secret)
 | 
					 | 
					 | 
					 | 
						kind := s.adapter.Kind()
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						_, err := secretcontroller.deletionHelper.HandleObjectInUnderlyingClusters(secret)
 | 
					 | 
					 | 
					 | 
						glog.V(3).Infof("Handling deletion of %s: %v", kind, namespacedName)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
					 | 
						_, err := s.deletionHelper.HandleObjectInUnderlyingClusters(obj)
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						if err != nil {
 | 
					 | 
					 | 
					 | 
						if err != nil {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							return err
 | 
					 | 
					 | 
					 | 
							return err
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}
 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
					
 | 
					 | 
					 | 
					 | 
					
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						err = secretcontroller.federatedApiClient.Core().Secrets(secret.Namespace).Delete(secret.Name, nil)
 | 
					 | 
					 | 
					 | 
						err = s.adapter.FedDelete(namespacedName, nil)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						if err != nil {
 | 
					 | 
					 | 
					 | 
						if err != nil {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							// Its all good if the error is not found error. That means it is deleted already and we do not have to do anything.
 | 
					 | 
					 | 
					 | 
							// Its all good if the error is not found error. That means it is deleted already and we do not have to do anything.
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							// This is expected when we are processing an update as a result of secret finalizer deletion.
 | 
					 | 
					 | 
					 | 
							// This is expected when we are processing an update as a result of finalizer deletion.
 | 
				
			
			
				
				
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							// The process that deleted the last finalizer is also going to delete the secret and we do not have to do anything.
 | 
					 | 
					 | 
					 | 
							// The process that deleted the last finalizer is also going to delete the resource and we do not have to do anything.
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							if !errors.IsNotFound(err) {
 | 
					 | 
					 | 
					 | 
							if !errors.IsNotFound(err) {
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
								return fmt.Errorf("failed to delete secret: %v", err)
 | 
					 | 
					 | 
					 | 
								return fmt.Errorf("failed to delete %s: %v", kind, err)
 | 
				
			
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
							}
 | 
					 | 
					 | 
					 | 
							}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						}
 | 
					 | 
					 | 
					 | 
						}
 | 
				
			
			
		
	
		
		
			
				
					
					 | 
					 | 
					 | 
						return nil
 | 
					 | 
					 | 
					 | 
						return nil
 | 
				
			
			
		
	
	
		
		
			
				
					
					| 
						
					 | 
					 | 
					 
 |